3634.txt
来自「This is the snapshot of Snot Latest Rule」· 文本 代码 · 共 65 行
TXT
65 行
Rule:--Sid:3634--Summary:This event is generated when an attempt is made to exploit aninteger overflow associated with Mozilla's processing of amalformed BMP file.--Impact:A successful attack can cause a heap overflow on the client hostrunning Mozilla and permit execution of arbitrary code at theprivilege level of the current user.--Detailed Information:The Mozilla browser is vulnerable to an integer overflow when processingimages in Bitmap (BMP) format. Programming errors may present anattacker with the opportunity to cause the integer overflow due toinsufficient bounds checking in the code that handles bitmap images.--Affected Systems: Mozilla Thunderbird 0.73 and prior Mozilla Firefox 0.9.3 and prior Mozilla browser 1.7.2 and prior Netscape Navigator 7.2 and prior--Attack Scenarios:An attacker can entice a user to view a malicious BMP file that causesthe overflow, enabling execution of arbitrary code on a vulnerable client.--Ease of Attack:Simple. Exploit code is available.--False Positives:None known.--False Negatives:None known.--Corrective Action:Upgrade to the most current non-affected version of the product.--Contributors:Sourcefire Vulnerability Research TeamAlex Kirk <akirk@sourcefire.com>Nigel Houghton <nigel.houghton@sourcefire.com>--Additional References--
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?